Sponsored Products

Publisher's Description

DeviceLock Endpoint DLP Suite provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network. With DeviceLock, security administrators can precisely match user rights to job function with regard to transferring, receiving and storing data on corporate computers. The resulting secure computing environment allows all legitimate user actions to proceed unimpeded while blocking any accidental or deliberate attempts to perform operations outside of preset bounds.

The DeviceLock component includes an entire set of context controls together with event logging and data shadowing for all local data channels on protected computers including peripheral devices and ports, clipboard, connected smartphones/PDA's, and document printing. DeviceLock also provides the core platform for all other functional modules of the product suite and includes its central management and administration components. The NetworkLock component performs all context control functions over endpoint network communications including port-independent protocol/application detection and selective control, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing. NetworkLock can be configured to control web mail, social networking communications, instant messaging, file transfer operations and Telnet sessions. NetworkLock can intercept, inspect and control plain and SSL-tunneled SMTP email communications with messages and attachments controlled separately, as well as web access and other HTTP-based applications and encrypted HTTPS sessions. Audit (event) logging and data shadowing trails are maintained as conditionally specified. The ContentLock component implements content monitoring and filtering of files transferred to and from removable media and Plug-n-Play devices, as well as of various data objects of network communications reconstructed and passed to it by NetworkLock.

DeviceLock's direct integration with MS AD's GPMC console is awesome! Any true Windows Admin would love this simplicity and seamless way of managing access and audit settings for PC ports and devices.

Cons

Unification of multiple alternative consoles to the GPO MMC would be cool... Enterprise Manager is slick... The other console's features for managing the optional Enterprise Servers should be rolled into this one.

Summary

Fantastic granularity and depth of feature settings for the price. USB white list and Temporary White List features and implementation are very cool... as is keylogger detection. Webinar VERY helpful. Enterprise Server collection and reporting processes are well thought out and network-friendly with server-side pull, compression, QOS settings, ability to break out ISO/CD/DVD files, and shadow PRINTING!!!. The file type rules are interesting as well.

E-mail This Review

Thank You, !

Report Offensive Content

If you believe this comment is offensive or violates the CNET's Site Terms of Use, you can report it below (this will not automatically remove the comment). Once reported, our staff will be notified and the comment will be reviewed.